US4663500A - Cryptographic system - Google Patents
Cryptographic system Download PDFInfo
- Publication number
- US4663500A US4663500A US06/878,518 US87851886A US4663500A US 4663500 A US4663500 A US 4663500A US 87851886 A US87851886 A US 87851886A US 4663500 A US4663500 A US 4663500A
- Authority
- US
- United States
- Prior art keywords
- binary digits
- sequence
- modulo
- generating
- responsive
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
Definitions
- the present invention relates to a cryptrographic system.
- the second type of prior art scramblers comprises a shift register coupled to the output of a modulo-2 adder which combines input data with the output of a cypher memory which stores a sequence of binary digits as a key code and reads the stored bits in response to an address code supplied from the shift register.
- the descrambler used in conjunction with such scramblers also comprises a shift register that supplies an address code for addressing the same key pattern as in the scrambler stored in a decipher memory the output of which is coupled to a modulo-2 adder to be combined with the scrambled input data. Should a bit error occur in the transmitted sequence, decoded data will be disrupted and such disruption will continue as long as the error bit is shifted in the shift register. If the number of the shift register stages is substantial, the disruption will continue for a long period of time even if the disruption is caused by a single bit error.
- This object is obtained by combining the nonrepetitive characteristic of feedback random number generation and the repetitive characteristic of initial key pattern generation to form a combined address code with which stored bits of the key pattern are addressed for modulo-2 summation with information data bits.
- a cryptographic system of the present invention comprises a data scrambler connected to one end of a medium for transmission of scrambled binary digits through said medium and a data descrambler connected to the other end of the medium to receive the transmitted binary digits.
- the data scrambler comprises a first modulo-2 adder having a first input connected to be responsive to a sequence of binary digits to be scrambled and a second input connected to be responsive to a sequence of scrambling binary digits for generating a sequence of scrambled binary digits for application to the medium.
- a first function generator having a memory for storing a predeterminable sequence of binary digits in addressible storage locations and reading the stored binary digits in response to an address code represented by combined first and second patterns of binary digits which are generated respectively by a first pattern generator and a first shift register which is connected to the output of the first modulo-2 adder.
- the output of the first function generator is the scrambling binary digits applied to the first modulo-2 adder.
- the data descrambler comprises a second modulo-2 adder having a first input connected to be responsive to the received binary digits and a second input connected to be responsive to a sequence of descrambling binary digits for generating a sequence of descrambled binary digits.
- a second function generator having a memory is included for storing a predeterminable sequence of binary digits in addressible storage locations and reading the stored binary digits in response to an address code represented by combined random patterns of binary digits which are generated respectively a second random pattern generator and a second shift register which is connected to be responsive to the received binary digits.
- the output of the second function generator is the descrambling binary digits applied to the second modulo-2 adder.
- the cryptographic system of the invention has a smaller disruption time than that of the second type of prior art while eliminating the disadvantage of the first type of prior art.
- FIG. 1 is a schematic illustration of a preferred embodiment of the invention.
- FIG. 2 is an illustration of an alternative embodiment of the invention.
- the system generally comprises a data scrambler 10 and a data descrambler 20 connected over a transmission medium 30.
- the data scrambler 10 comprises a function generator 11, a key pattern generator 12, a random pattern generator 13, a shift register 14 and a modulo-2 adder or Exclusive-OR gate 15.
- the function generator 11 may comprise a read-only memory or random access memory for storing a random sequence of binary 1's and 0's supplied from the key pattern generator 12 in addressible locations.
- the random pattern generator 13 may comprise a linear feedback shift register which generates a sequence of random patterns of parallel binary 1's and 0's in response to a clock pulse supplied from a clock source 17.
- the function generator 11 reads the stored binary 1's and 0's as a function of an address code which combines the outputs of the random pattern generator 13 and shift register 14.
- the output of the function generator 11 is therefore a random sequence of scrambling binary 1's and 0's which are fed to the modulo-2 adder 15.
- a sequence of input digital data at input terminal 16 is modulo-2 summed in the adder 15 with the scrambling bits on a per bit basis.
- the scrambled data bits are sequentially applied on the one hand to the shift register 14 and on the other hand to the transmission medium 30.
- the shift register 14 supplies the stored bits to the function generator 11 in parallel form in response to the clock pulse supplied from the clock source 17 which is synchronized with the input digital data.
- the function generator 11 is also synchronized with the clock source 17 so that the scrambling data bits are time coincident with the input data bits at terminal 16.
- the transmitted scrambled data bits are received by the data descrambler 20.
- the descrambler 20 operates on the received data bits in a process inverse to that of the scrambler 10.
- the scrambled data bits are applied to a shift register 24 having the same number of bit positions as the shift register 14.
- a function generator 21 identical to the function generator 11 stores a key pattern supplied from a key pattern generator 22 and reads the stored bits as a function of a combined set of address bits supplied from the shift register 24 and a random pattern generator 23 which is also identical to the random pattern generator 13.
- a bit synchronization pulse is obtained from a sync generator 27 coupled to the input terminal of the descrambler.
- the input bit stream is modulo-2 summed in an Exclusive-OR gate 25 with a sequence of descrambling bits from the function generator 21.
- the original bit stream is delivered from the modulo-2 adder 25 to an output terminal 26.
- FIG. 2 is an illustration of an alternative embodiment of the invention which is similar to the previous embodiment with the exception that in the scrambler 10 one of the output leads of the shift register 14 is disconnected from the function generator 11 and coupled instead to an input of a modulo-2 adder 18.
- the modulo-2 adder 18 takes its another input from the function generator 11 to provide a sequence of scrambling bits for coupling to the modulo-2 adder 15.
- one of the output leads of the random pattern generator 13 may be disconnected from the function generator 11 and coupled to the modulo-2 adder 18, instead of applying the one-bit output from the shift register 14.
- the descrambler 20 includes a modulo-2 adder 28 which receives one of the output leads of the shift register 24 to proive modulo-2 summation with the output of the function generator 21 for generating a descrambling bit sequence for application to the modulo-2 adder 25.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Error Detection And Correction (AREA)
Abstract
A cryptographic system comprises a modulo-2 adder having a first input receptive of a sequence of binary digits to be scrambled and a second input receptive of a sequence of scrambling binary digits for generating a sequence of scrambled binary digits. A function generator having a memory is provided for storing a predeterminable sequence of binary digits in addressible storage locations and reading the stored binary digits in response to an address code represented by combined first and second patterns of binary digits which are generated respectively by a random pattern generator and a shift register which is connected to the output of the modulo-2 adder. The output of the function generator is the scrambling binary digits applied to the modulo-2 adder.
Description
This is a continuation of U.S. patent application Ser. No. 06/514,159, filed July 15, 1983, now abandoned.
The present invention relates to a cryptrographic system.
When scrambling digital information data, it is the current practice to employ a random number generator which generates a random pattern of binary 1's and 0's with which the data are modulo-2 summed. Current random number generators are broadly classified into a first type in which the random number is dependent exclusively on the initial value and a second type in which the random number is dependent on the scrambled data. The first type of random number generators is susceptible to wire tapping because the repetitive sequence of bit pattern is easily discernible by eavesdroppers. The second type of prior art scramblers comprises a shift register coupled to the output of a modulo-2 adder which combines input data with the output of a cypher memory which stores a sequence of binary digits as a key code and reads the stored bits in response to an address code supplied from the shift register. The descrambler used in conjunction with such scramblers also comprises a shift register that supplies an address code for addressing the same key pattern as in the scrambler stored in a decipher memory the output of which is coupled to a modulo-2 adder to be combined with the scrambled input data. Should a bit error occur in the transmitted sequence, decoded data will be disrupted and such disruption will continue as long as the error bit is shifted in the shift register. If the number of the shift register stages is substantial, the disruption will continue for a long period of time even if the disruption is caused by a single bit error.
It is therefore an object of the invention to provide a cryptographic system which prevents long-period data disruptions while ensuring security against eavesdroppers.
This object is obtained by combining the nonrepetitive characteristic of feedback random number generation and the repetitive characteristic of initial key pattern generation to form a combined address code with which stored bits of the key pattern are addressed for modulo-2 summation with information data bits.
A cryptographic system of the present invention comprises a data scrambler connected to one end of a medium for transmission of scrambled binary digits through said medium and a data descrambler connected to the other end of the medium to receive the transmitted binary digits. The data scrambler comprises a first modulo-2 adder having a first input connected to be responsive to a sequence of binary digits to be scrambled and a second input connected to be responsive to a sequence of scrambling binary digits for generating a sequence of scrambled binary digits for application to the medium. A first function generator having a memory is provided for storing a predeterminable sequence of binary digits in addressible storage locations and reading the stored binary digits in response to an address code represented by combined first and second patterns of binary digits which are generated respectively by a first pattern generator and a first shift register which is connected to the output of the first modulo-2 adder. The output of the first function generator is the scrambling binary digits applied to the first modulo-2 adder.
The data descrambler comprises a second modulo-2 adder having a first input connected to be responsive to the received binary digits and a second input connected to be responsive to a sequence of descrambling binary digits for generating a sequence of descrambled binary digits. A second function generator having a memory is included for storing a predeterminable sequence of binary digits in addressible storage locations and reading the stored binary digits in response to an address code represented by combined random patterns of binary digits which are generated respectively a second random pattern generator and a second shift register which is connected to be responsive to the received binary digits. The output of the second function generator is the descrambling binary digits applied to the second modulo-2 adder.
In the event of a transmission error, a disruption will occur in the bit stream in the second shift register. However, the disruption persists as long as the error bit exists in the second shift register which accounts for only a portion of the full address code of the second function generator. Therefore, the cryptographic system of the invention has a smaller disruption time than that of the second type of prior art while eliminating the disadvantage of the first type of prior art.
The present invention will be described in further detail with reference to the accompanying drawings, in which:
FIG. 1 is a schematic illustration of a preferred embodiment of the invention; and
FIG. 2 is an illustration of an alternative embodiment of the invention.
Referring now to FIG. 1, there is shown a cryptographic system of the present invention. The system generally comprises a data scrambler 10 and a data descrambler 20 connected over a transmission medium 30. The data scrambler 10 comprises a function generator 11, a key pattern generator 12, a random pattern generator 13, a shift register 14 and a modulo-2 adder or Exclusive-OR gate 15. The function generator 11 may comprise a read-only memory or random access memory for storing a random sequence of binary 1's and 0's supplied from the key pattern generator 12 in addressible locations. The random pattern generator 13 may comprise a linear feedback shift register which generates a sequence of random patterns of parallel binary 1's and 0's in response to a clock pulse supplied from a clock source 17. The function generator 11 reads the stored binary 1's and 0's as a function of an address code which combines the outputs of the random pattern generator 13 and shift register 14. The output of the function generator 11 is therefore a random sequence of scrambling binary 1's and 0's which are fed to the modulo-2 adder 15. A sequence of input digital data at input terminal 16 is modulo-2 summed in the adder 15 with the scrambling bits on a per bit basis. The scrambled data bits are sequentially applied on the one hand to the shift register 14 and on the other hand to the transmission medium 30. The shift register 14 supplies the stored bits to the function generator 11 in parallel form in response to the clock pulse supplied from the clock source 17 which is synchronized with the input digital data. The function generator 11 is also synchronized with the clock source 17 so that the scrambling data bits are time coincident with the input data bits at terminal 16.
The transmitted scrambled data bits are received by the data descrambler 20. The descrambler 20 operates on the received data bits in a process inverse to that of the scrambler 10. The scrambled data bits are applied to a shift register 24 having the same number of bit positions as the shift register 14. A function generator 21 identical to the function generator 11 stores a key pattern supplied from a key pattern generator 22 and reads the stored bits as a function of a combined set of address bits supplied from the shift register 24 and a random pattern generator 23 which is also identical to the random pattern generator 13. A bit synchronization pulse is obtained from a sync generator 27 coupled to the input terminal of the descrambler. The input bit stream is modulo-2 summed in an Exclusive-OR gate 25 with a sequence of descrambling bits from the function generator 21. The original bit stream is delivered from the modulo-2 adder 25 to an output terminal 26.
Since the number of bits stored in the shift register 24 accounts for a fraction of the number of address bits and is much smaller than the corresponding number of bits of the feedback type of prior art cryptographic system, a bit error in the received sequence will exist in the shift register 24 for a small interval time as compared with the prior art system, and the resultant disruption does not persist for a long period of time. Since the scrambled data sequence contains no repetitive patterns, the system ensures security against wire tapping.
FIG. 2 is an illustration of an alternative embodiment of the invention which is similar to the previous embodiment with the exception that in the scrambler 10 one of the output leads of the shift register 14 is disconnected from the function generator 11 and coupled instead to an input of a modulo-2 adder 18. The modulo-2 adder 18 takes its another input from the function generator 11 to provide a sequence of scrambling bits for coupling to the modulo-2 adder 15. Alternatively, one of the output leads of the random pattern generator 13 may be disconnected from the function generator 11 and coupled to the modulo-2 adder 18, instead of applying the one-bit output from the shift register 14. In like manner, the descrambler 20 includes a modulo-2 adder 28 which receives one of the output leads of the shift register 24 to proive modulo-2 summation with the output of the function generator 21 for generating a descrambling bit sequence for application to the modulo-2 adder 25.
Claims (9)
1. A cryptographic system comprising:
a data scrambler connected to one end of a medium, said scrambler comprising:
a first modulo-2 adder means having a first input responsive to a sequence of binary digits to be scrambled and a second input responsive to a sequence of scrambling binary digits for generating a sequence of scrambled binary digits for application to said medium;
a first time base means for generating clock pulses;
a first pattern generator means for generating an first random pattern of binary digits in response to each of said clock pulses from said first time base means;
a first shift register means responsive to said scrambled binary digits for generating a second random pattern of binary digits; and
a first function generator means having a memory for storing a predeterminable sequence of binary digits in addressible storage locations and for reading the stored binary digits in response to an address code represented by combined first and second random patterns of binary digits supplied from said first pattern generator means and said first shift register means for generating a sequence of binary digits for application to the second input of said first modulo-2 adder means as said scrambling binary digits, and
a data descrambler means connected to the other end of said medium to receive said sequence of scrambled binary digits, said descrambler comprising:
a second time base means for generating clock pulses in response to binary digits of the received sequence;
a second modulo-2 adder means having a first input responsive to the received sequence of scrambled binary digits and a second input responsive to a sequence of descrambling binary digits for generating a sequence of descrambled binary digits;
a second pattern generator means for generating an third random pattern of binary digits identical to the first random pattern generated by said first pattern generator means in response to each of the clock pulses from said second time base means;
a second shift register means responsive to the received sequence of scrambled binary digits for generating a fourth random pattern of binary digits; and
a second function generator means having a memory for storing a predeterminable sequence of binary digits in addressible storage locations and for reading the stored binary digits in response to an address code represented by combined third and fourth random patterns of binary digits supplied from said second pattern generator means and said second shift register means for generating a sequence of said binary digits for application to the second input of said second modulo-2 adder means as said descrambling binary digits.
2. A cryptographic system as claimed in claim 1, wherein the number of binary digits in each of said first and third random patterns means is smaller than the number of binary digits in each of said second and fourth random patterns.
3. A cryptographic system as claimed in claim 1, wherein said first shift register means includes a first bit position and a plurality of second bit positions coupled to said first function generator means, and wherein said scrambler further comprises a third modulo-2 adder means having a first input connected to be responsive to said first bit position and a second input connected to be responsive to a sequence of binary digits supplied from said first function generator means and providing a sequence of binary digits for application to said first modulo-2 adder means as said scrambling binary digits, and wherein said second shift register means includes a first bit position and a plurality of second bit positions coupled to said second function generator means, said descrambler further comprising a fourth modulo-2 adder means having a first input connected to be responsive to said first bit position of said second shift register means and a second input connected to be responsive to a sequence of binary digits supplied from said second function generator means for application to said second modulo-2 adder means as said descrambling binary digits.
4. A data scrambler for cryptographic systems comprising:
a modulo-2 adder means having a first input responsive to a sequence of binary digits to be scrambled and a second input responsive to a sequence of scrambling binary digits for generating a sequence of scrambled binary digits to be transmitted;
a time base means for generating clock pulses;
a pattern generator means for generating an first random pattern of binary digits in response to each of the clock pulses supplied from said time base;
a shift register means responsive to said scrambled binary digits for generating a second random pattern of binary digits; and
a function generator means having a memory for storing a predeterminable sequence of binary digits in addressible storage locations and for reading the stored binary digits in response to an address code represented by combined first and second random patterns of binary digits supplied from said pattern generator means and said shift register means for generating a sequence of binary digits for application to the second input of said modulo-2 adder means as said scrambling binary digits.
5. A data scrambler as claimed in claim 4, wherein the number of binary digits in said first random pattern is smaller than the number of binary digits in said second random pattern.
6. A data scrambler as claimed in claim 4, wherein said shift register means includes a first bit position and a plurality of second bit positions coupled to said function generator means, further comprising a second modulo-2 adder means having a first input connected to be responsive to said first bit position and a second input connected to be responsive to a sequence of binary digits supplied from said function generator means and providing a sequence of binary digits for application to the first-mentioned modulo-2 adder means as said scrambling binary digits.
7. A data descrambler for cryptographic systems comprising:
a modulo-2 adder means having a first input resplnsive to a received sequence of scrambled binary digits and a second input responsive to a sequence of descrambling binary digits for generating a sequence of descrambled binary digits;
a time base means for generating clock pulses in response to the binary digits of the received sequence;
a pattern generator means for generating an third random pattern of binary digits in response to each of the clock pulses supplied from said time base means;
a shift register means responsive to the received sequence of scrambled binary digits for generating a fourth random pattern of binary digits; and
a function generator means having a memory for storing a predeterminable sequence of binary digits in addressible storage locations and for reading the stored binary digits in response to an address code represented by combined third and fourth random patterns of binary digits supplied from said pattern generator means and said shift register means for generating a sequence of said binary digits for application to the second input of said modulo-2 adder means as said descrambling binary digits.
8. A data descrambler as claimed in claim 7, wherein the number of binary digits in said third random pattern is smaller than the number of binary digits in said fourth random pattern.
9. A data descrambler as claimed in claim 7, wherein said shift register means includes a first bit position and a plurality of second bit positions coupled to said function generator means, further comprising a second modulo-2 adder means having a first input connected to be responsive to said first bit position and a second input connected to be responsive to a sequence of binary digits supplied from said function generator means for application to beh first-mentioned modulo-2 adder means as said descrambling binary digits.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP57026184A JPS57156458A (en) | 1981-02-25 | 1982-02-22 | 4-methylmercapto-2-acetoxy-butylaldehyde and manufacture |
JP57-026184 | 1982-07-20 | ||
JP57126183A JPS5916441A (en) | 1982-07-20 | 1982-07-20 | Scrambler |
JP57-126183 | 1982-07-20 |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US06514159 Continuation | 1983-07-15 |
Publications (1)
Publication Number | Publication Date |
---|---|
US4663500A true US4663500A (en) | 1987-05-05 |
Family
ID=26363931
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US06/878,518 Expired - Lifetime US4663500A (en) | 1982-02-22 | 1986-06-23 | Cryptographic system |
Country Status (1)
Country | Link |
---|---|
US (1) | US4663500A (en) |
Cited By (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4760600A (en) * | 1987-02-13 | 1988-07-26 | Oki Electric Industry Co., Ltd. | Cipher system |
US4815130A (en) * | 1986-10-03 | 1989-03-21 | Communications Satellite Corporation | Stream cipher system with feedback |
US4852166A (en) * | 1986-10-31 | 1989-07-25 | Telecommunications Radioelectriques Et Telephoniques T.R.T. | Analogue scrambling system with dynamic band permutation |
US5054067A (en) * | 1990-02-21 | 1991-10-01 | General Instrument Corporation | Block-cipher cryptographic device based upon a pseudorandom nonlinear sequence generator |
US5195136A (en) * | 1991-09-30 | 1993-03-16 | Motorola, Inc. | Method and apparatus for data encryption or decryption |
US5204903A (en) * | 1990-11-05 | 1993-04-20 | Nippon Telegraph And Telephone Corporation | Secure communication equipment and secure transmission system |
US5278906A (en) * | 1991-12-20 | 1994-01-11 | Koninklijke Pit Nederland N.V. | System for encoding data presented with a first coding device and for decoding encoded data with a second coding device, and coding device for use in the system |
US5365588A (en) * | 1993-03-12 | 1994-11-15 | Hughes Aircraft Company | High speed encryption system and method |
WO1995025392A1 (en) * | 1994-03-14 | 1995-09-21 | Shaw William Y | Variable-key cryptography system |
US5530959A (en) * | 1994-05-18 | 1996-06-25 | At&T Corp. | Self-synchronizing scrambler/descrambler without error multiplication |
US5623548A (en) * | 1994-01-10 | 1997-04-22 | Fujitsu Limited | Transformation pattern generating device and encryption function device |
US5805704A (en) * | 1995-12-15 | 1998-09-08 | United Microelectronics Corp. | Method and apparatus for protecting broadcast software against unauthorized reception on a software broadcasting system |
US6408019B1 (en) | 1997-12-29 | 2002-06-18 | Georgia Tech Research Corporation | System and method for communication using noise |
US20030102493A1 (en) * | 2001-11-30 | 2003-06-05 | Luc Wuidart | Regeneration of a secret quantity from an intergrated circuit identifier |
US20030103628A1 (en) * | 2001-11-30 | 2003-06-05 | Wuidart Luc | Diversification of a single integrated circuit identifier |
EP1376922A1 (en) * | 2001-04-03 | 2004-01-02 | Mitsubishi Denki Kabushiki Kaisha | Encrypting device |
US20040208322A1 (en) * | 1997-10-10 | 2004-10-21 | Interdigital Technology Corporation | Circuit and software for generating a stream cipher |
US7245721B1 (en) | 1999-02-19 | 2007-07-17 | Meridian Audio Ltd. | Data encoding/decoding device and apparatus using the same |
US20080183793A1 (en) * | 2007-01-29 | 2008-07-31 | Kabushiki Kaisha Toshiba | Logic circuit |
US20080212776A1 (en) * | 2006-11-07 | 2008-09-04 | Kabushiki Kaisha Toshiba | Encryption processing circuit and encryption processing method |
US7966496B2 (en) | 1999-07-02 | 2011-06-21 | Jpmorgan Chase Bank, N.A. | System and method for single sign on process for websites with multiple applications and services |
US7987501B2 (en) | 2001-12-04 | 2011-07-26 | Jpmorgan Chase Bank, N.A. | System and method for single session sign-on |
US8160960B1 (en) | 2001-06-07 | 2012-04-17 | Jpmorgan Chase Bank, N.A. | System and method for rapid updating of credit information |
US8185940B2 (en) | 2001-07-12 | 2012-05-22 | Jpmorgan Chase Bank, N.A. | System and method for providing discriminated content to network users |
US8301493B2 (en) | 2002-11-05 | 2012-10-30 | Jpmorgan Chase Bank, N.A. | System and method for providing incentives to consumers to share information |
US8849716B1 (en) | 2001-04-20 | 2014-09-30 | Jpmorgan Chase Bank, N.A. | System and method for preventing identity theft or misuse by restricting access |
US10726417B1 (en) | 2002-03-25 | 2020-07-28 | Jpmorgan Chase Bank, N.A. | Systems and methods for multifactor authentication |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4434322A (en) * | 1965-08-19 | 1984-02-28 | Racal Data Communications Inc. | Coded data transmission system |
US4447672A (en) * | 1980-10-06 | 1984-05-08 | Nippon Electric Co., Ltd. | Device for encrypting each input data bit by at least one keying bit decided by a code pattern and a bit pattern of a predetermined number of preceding encrypted bits |
-
1986
- 1986-06-23 US US06/878,518 patent/US4663500A/en not_active Expired - Lifetime
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4434322A (en) * | 1965-08-19 | 1984-02-28 | Racal Data Communications Inc. | Coded data transmission system |
US4447672A (en) * | 1980-10-06 | 1984-05-08 | Nippon Electric Co., Ltd. | Device for encrypting each input data bit by at least one keying bit decided by a code pattern and a bit pattern of a predetermined number of preceding encrypted bits |
Non-Patent Citations (2)
Title |
---|
IBM Technical Disclosure Bulletin, "Block Chaining Using Plaintext-Ciphertext Feedback" by Ehrsam et al., vol. 22, #2 7/79. |
IBM Technical Disclosure Bulletin, Block Chaining Using Plaintext Ciphertext Feedback by Ehrsam et al., vol. 22, 2 7/79. * |
Cited By (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4815130A (en) * | 1986-10-03 | 1989-03-21 | Communications Satellite Corporation | Stream cipher system with feedback |
US4852166A (en) * | 1986-10-31 | 1989-07-25 | Telecommunications Radioelectriques Et Telephoniques T.R.T. | Analogue scrambling system with dynamic band permutation |
US4760600A (en) * | 1987-02-13 | 1988-07-26 | Oki Electric Industry Co., Ltd. | Cipher system |
US5054067A (en) * | 1990-02-21 | 1991-10-01 | General Instrument Corporation | Block-cipher cryptographic device based upon a pseudorandom nonlinear sequence generator |
AU634857B2 (en) * | 1990-02-21 | 1993-03-04 | General Instrument Corporation | Block-cipher cryptographic device based upon a pseudorandom nonlinear sequence generator |
US5204903A (en) * | 1990-11-05 | 1993-04-20 | Nippon Telegraph And Telephone Corporation | Secure communication equipment and secure transmission system |
US5195136A (en) * | 1991-09-30 | 1993-03-16 | Motorola, Inc. | Method and apparatus for data encryption or decryption |
US5278906A (en) * | 1991-12-20 | 1994-01-11 | Koninklijke Pit Nederland N.V. | System for encoding data presented with a first coding device and for decoding encoded data with a second coding device, and coding device for use in the system |
US5365588A (en) * | 1993-03-12 | 1994-11-15 | Hughes Aircraft Company | High speed encryption system and method |
US5623548A (en) * | 1994-01-10 | 1997-04-22 | Fujitsu Limited | Transformation pattern generating device and encryption function device |
GB2301266B (en) * | 1994-03-14 | 1998-04-01 | William Yin Shaw | Variable-key cryptography system |
US5619576A (en) * | 1994-03-14 | 1997-04-08 | Shaw; William Y. | Variable-key cryptography system |
WO1995025392A1 (en) * | 1994-03-14 | 1995-09-21 | Shaw William Y | Variable-key cryptography system |
GB2301266A (en) * | 1994-03-14 | 1996-11-27 | William Yin Shaw | Variable-key cryptography system |
US5530959A (en) * | 1994-05-18 | 1996-06-25 | At&T Corp. | Self-synchronizing scrambler/descrambler without error multiplication |
US5805704A (en) * | 1995-12-15 | 1998-09-08 | United Microelectronics Corp. | Method and apparatus for protecting broadcast software against unauthorized reception on a software broadcasting system |
US20040208322A1 (en) * | 1997-10-10 | 2004-10-21 | Interdigital Technology Corporation | Circuit and software for generating a stream cipher |
US6944253B2 (en) * | 1997-10-10 | 2005-09-13 | Interdigital Technology Corp. | Circuit and software for generating a stream cipher |
US6408019B1 (en) | 1997-12-29 | 2002-06-18 | Georgia Tech Research Corporation | System and method for communication using noise |
US7245721B1 (en) | 1999-02-19 | 2007-07-17 | Meridian Audio Ltd. | Data encoding/decoding device and apparatus using the same |
US7966496B2 (en) | 1999-07-02 | 2011-06-21 | Jpmorgan Chase Bank, N.A. | System and method for single sign on process for websites with multiple applications and services |
US8590008B1 (en) | 1999-07-02 | 2013-11-19 | Jpmorgan Chase Bank, N.A. | System and method for single sign on process for websites with multiple applications and services |
EP1376922A1 (en) * | 2001-04-03 | 2004-01-02 | Mitsubishi Denki Kabushiki Kaisha | Encrypting device |
EP1376922A4 (en) * | 2001-04-03 | 2009-03-18 | Mitsubishi Electric Corp | Encrypting device |
US8849716B1 (en) | 2001-04-20 | 2014-09-30 | Jpmorgan Chase Bank, N.A. | System and method for preventing identity theft or misuse by restricting access |
US10380374B2 (en) | 2001-04-20 | 2019-08-13 | Jpmorgan Chase Bank, N.A. | System and method for preventing identity theft or misuse by restricting access |
US8160960B1 (en) | 2001-06-07 | 2012-04-17 | Jpmorgan Chase Bank, N.A. | System and method for rapid updating of credit information |
US8185940B2 (en) | 2001-07-12 | 2012-05-22 | Jpmorgan Chase Bank, N.A. | System and method for providing discriminated content to network users |
US20030103628A1 (en) * | 2001-11-30 | 2003-06-05 | Wuidart Luc | Diversification of a single integrated circuit identifier |
US7941672B2 (en) * | 2001-11-30 | 2011-05-10 | Stmicroelectronics S.A. | Regeneration of a secret quantity from an intergrated circuit identifier |
US7796759B2 (en) | 2001-11-30 | 2010-09-14 | Stmicroelectronics S.A. | Diversification of a single integrated circuit identifier |
US20030102493A1 (en) * | 2001-11-30 | 2003-06-05 | Luc Wuidart | Regeneration of a secret quantity from an intergrated circuit identifier |
US7987501B2 (en) | 2001-12-04 | 2011-07-26 | Jpmorgan Chase Bank, N.A. | System and method for single session sign-on |
US8707410B2 (en) | 2001-12-04 | 2014-04-22 | Jpmorgan Chase Bank, N.A. | System and method for single session sign-on |
US10726417B1 (en) | 2002-03-25 | 2020-07-28 | Jpmorgan Chase Bank, N.A. | Systems and methods for multifactor authentication |
US8301493B2 (en) | 2002-11-05 | 2012-10-30 | Jpmorgan Chase Bank, N.A. | System and method for providing incentives to consumers to share information |
US8155317B2 (en) * | 2006-11-07 | 2012-04-10 | Kabushiki Kaisha Toshiba | Encryption processing circuit and encryption processing method |
US20080212776A1 (en) * | 2006-11-07 | 2008-09-04 | Kabushiki Kaisha Toshiba | Encryption processing circuit and encryption processing method |
US20080183793A1 (en) * | 2007-01-29 | 2008-07-31 | Kabushiki Kaisha Toshiba | Logic circuit |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US4663500A (en) | Cryptographic system | |
US4447672A (en) | Device for encrypting each input data bit by at least one keying bit decided by a code pattern and a bit pattern of a predetermined number of preceding encrypted bits | |
US5253294A (en) | Secure transmission system | |
EP0227318B1 (en) | Encryption/decryption system | |
US4211891A (en) | Method for setting code text generators in ciphering devices | |
US5193115A (en) | Pseudo-random choice cipher and method | |
US4668103A (en) | Polygraphic encryption-decryption communications system | |
US4322576A (en) | Message format for secure communication over data links | |
EP0342832B1 (en) | Dynamic feedback arrangement scrambling technique keystream generator | |
US5115467A (en) | Signal encryption apparatus for generating common and distinct keys | |
US4255811A (en) | Key controlled block cipher cryptographic system | |
US4944006A (en) | Secure data packet transmission system and method | |
EP0002578B1 (en) | Data communication method | |
AU663027B2 (en) | A method for loading encryption keys into secure transmission devices | |
US5488658A (en) | Video signal scrambling and descrambling apparatus | |
EP0913964A2 (en) | A method of and an apparatus for generating internal crypto-keys | |
KR950704733A (en) | METHOD AND APPARATUS FOR ENCRYPION HAVING A FEEDBACK REGISTER WITH SELECTABLE TAPS | |
US6249582B1 (en) | Apparatus for and method of overhead reduction in a block cipher | |
US4431865A (en) | Digital signal enciphering and deciphering apparatus and system | |
US4133974A (en) | System for locally enciphering prime data | |
US4797922A (en) | Method of, and apparatus for, transforming a digital data sequence into an encoded form | |
EP0782069A1 (en) | Pseudorandom number generator | |
GB2319704A (en) | Data encryption technique | |
US6912284B1 (en) | Self-Authenticating cryptographic apparatus | |
US4876718A (en) | Secure data packet transmission system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 12 |